The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - Feb. (vol. 49)
ISSN: 0018-9162

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2
70th Anniversary Milestones

Masthead (PDF)

pp. 4
Elsewhere in the CS
Computing Conversations
Spotlight on Transactions

Securing Mobile Applications (HTML)

Elisa Bertino , Purdue University
pp. 9
32 & 16 Years Ago

32 & 16 Years Ago (HTML)

pp. 10-11
Guest Editor's Introduction

Cloud Computing (HTML)

pp. 12-13
Cloud Computing

Extending Amdahl's Law for the Cloud Computing Era (Abstract)

Fernando Diaz-del-Rio , University of Seville
Javier Salmeron-Garcia , University of Seville
Jose Luis Sevillano , University of Seville
pp. 14-22
Cloud Computing

Dimensions for Evaluating Cloud Resource Orchestration Frameworks (Abstract)

Alireza Khoshkbarforoushha , Australian National University and Commonwealth Scientific and Industrial Research Organisation
Meisong Wang , Australian National University
Rajiv Ranjan , Newcastle University
Lizhe Wang , Chinese Academy of Sciences
Leila Alem , Commonwealth Scientific and Industrial Research Organisation
Samee U. Khan , North Dakota State University
Boualem Benatallah , University of New South Wales
pp. 24-33
Cloud Cover

Managing Trust in the Cloud: State of the Art and Research Challenges (Abstract)

Talal H. Noor , Taibah University
Quan Z. Sheng , University of Adelaide
Zakaria Maamar , Zayed University
Sherali Zeadally , University of Kentucky
pp. 34-45
Cloud Computing

Energy-Efficient Workload Placement in Enterprise Datacenters (Abstract)

Quan Zhang , Wayne State University
Weisong Shi , Wayne State University
pp. 46-52
Research Feature

A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining (Abstract)

Lei Xu , Tsinghua University
Chunxiao Jiang , Tsinghua University
Yan Chen , University of Electronic Science and Technology of China
Jian Wang , Tsinghua University
Yong Ren , Tsinghua University
pp. 54-62
Out of Band

Secretocracy (HTML)

Hal Berghel , University of Nevada, Las Vegas
pp. 63-67
Cloud Cover

Protecting Privacy in the Cloud: Current Practices, Future Directions (Abstract)

Mahmoud Barhamgi , The Open University, Milton Keynes
Arosha K. Bandara , The Open University, Milton Keynes
Yijun Yu , The Open University, Milton Keynes
Khalid Belhajjame , Paris Dauphine University
Bashar Nuseibeh , The Open University, Milton Keynes and Lero-The Irish Software Research Centre
pp. 68-72
Cybertrust

Gambling with Source Code (Abstract)

Nir Kshetri , University of North Carolina at Greensboro
pp. 74-77
Science Fiction Prototyping

Futures We Want to Inhabit (HTML)

Brian David Johnson , Arizona State University
David Guston , Arizona State University
pp. 78-79
The Iot Connection

Taking the Internet to the Next Physical Level (Abstract)

Vint Cerf , Google Research
Max Senges , Google Research
pp. 80-86
CS Connection

CS Connection (HTML)

pp. 87-88
The Errant Hashtag

The Post-MOOC World (HTML)

David Alan Grier , George Washington University
pp. 104
92 ms
(Ver 3.3 (11022016))